Computer crime

Results: 9938



#Item
991Privacy Impact Assessment

Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-05-12 14:54:35
992CASE STUDY THE NEW FRONTLINE IN CYBER DEFENCE Case Study  THE NEW FRONTLINE IN CYBER DEFENCE

CASE STUDY THE NEW FRONTLINE IN CYBER DEFENCE Case Study THE NEW FRONTLINE IN CYBER DEFENCE

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2015-04-10 11:43:59
993Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Gilles Barthe2 Andre Scedrov1 1 University

Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Gilles Barthe2 Andre Scedrov1 1 University

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-31 09:39:58
994Future Research in Systems Security Evangelos Markatos and Davide Balzarotti⋆ , eds The SysSec Project   Abstract. During its first year of operation, the SysSec network of excellence has creat

Future Research in Systems Security Evangelos Markatos and Davide Balzarotti⋆ , eds The SysSec Project Abstract. During its first year of operation, the SysSec network of excellence has creat

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-04 10:19:02
995UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ ) UNITED STATES OF AMERICA, )

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ ) UNITED STATES OF AMERICA, )

Add to Reading List

Source URL: epic.org

Language: English - Date: 2011-07-05 11:04:45
996Case 1:12-cvABJ Document 12  FiledPage 1 of 12 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:12-cvABJ Document 12 FiledPage 1 of 12 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-02-24 12:18:50
997National security / Computing / Quality assurance / Software assurance / Email / Computer security / Science / Software development process / Security / Software quality / Crime prevention

ASSOCIATE MEMBERSHIP APPLICATION

Add to Reading List

Source URL: safecode.org

Language: English - Date: 2014-08-15 16:06:18
998Microsoft Word - ICCC5 rev 14

Microsoft Word - ICCC5 rev 14

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:16:26
999CYBER LAW & INFORMATION TECHNOLOGY by Talwant Singh Addl. Distt. & Sessions Judge, Delhi Success in any field of human activity leads to crime that needs mechanisms to control it. Legal provisions should provide assuranc

CYBER LAW & INFORMATION TECHNOLOGY by Talwant Singh Addl. Distt. & Sessions Judge, Delhi Success in any field of human activity leads to crime that needs mechanisms to control it. Legal provisions should provide assuranc

Add to Reading List

Source URL: delhicourts.nic.in

Language: English - Date: 2009-10-01 04:04:11
1000GrayZone - Quarterly Digest - January 2005

GrayZone - Quarterly Digest - January 2005

Add to Reading List

Source URL: grayzone.com

Language: English - Date: 2015-01-04 14:53:16